Issue Brief
Issue Brief
Brief
ISSUE NO. 748
NOVEMBER 2024
© 2024 Observer Research Foundation. All rights reserved. No part of this publication may
be reproduced, copied, archived, retained or transmitted through print, speech or electronic
media without prior written approval from ORF.
International Cyber Incidents:
On the Question of Public
Attribution
Arindrajit Basu
The public attribution of a cyber incident—undertaken coherently
and underscored by robust decision-making—can be a useful tool
for national security. India, thus far, has not publicly attributed
any international cyber incident to a specific private perpetrator or
nation-state. Studying the models framed by scholars based in other
jurisdictions, this brief offers suggestions on how India can approach
the issue of public attribution of cyberattacks. Based on existing
criteria, if a decision to publicly attribute is made, the brief proposes
the following options, either individually or in combination, for Indian
decision-makers: criminal indictment; international legal attribution;
political attribution; and relying on third-party attribution.
Attribution: Arindrajit Basu, “International Cyber Incidents: On the Question of Public Attribution,” ORF
Issue Brief No. 748, November 2024, Observer Research Foundation.
01
W
e live in an age of cyber ‘unpeace’1 where modern mid-
spectrum rivalry “fits neither the destructive criteria
[and violence] of war nor the acceptable boundaries of
peace.”2 The blurring of cyber boundaries brought about
by asymmetry allows both states and nation-states to
attain international economic and geopolitical objectives without engaging in
traditional kinetic warfare.
This new reality compels holistic and cohesive thinking from policymakers
across the world on how to exploit opportunities and minimise threats posed by
the pervading uncertainty of cyber ‘unpeace’. International cyber operations,
frequently undertaken by states, state-backed actors, or independent non-state
actors, provide asymmetric advantages to entities that may not boast traditional
military or technological power. The many challenges of effectively attributing
attacks to a perpetrator or group compounds geopolitical uncertainty.
actors can likewise use varied technical means to trace the attack’s origins,
accurate attribution remains a cumbersome and challenging process.5
3
Scholarship published in the past two years recognises both arguments
and suggests frameworks to guide decision-makers on publicly attributing
cyber incidents.9 As noted by the editors of an ORF monograph on emerging
technologies and future warfare,10 the transformation of warfare in the age of
unpeace demands an arsenal of strategic options to counter cyber incidents and
secure India’s burgeoning digital economy. Public attribution, guided by sound
decision-making, can be useful. Thus far, India has not publicly attributed a
specific international cyber incident to a specific private perpetrator or nation-
state. This brief applies the models created by Western scholars to outline
suggestions on how India can view the question of public attribution of
cyberattacks.
Introduction
4
I
ncreased digitisation, combined with the country’s geopolitical
location amid two adversarial neighbours, makes India vulnerable
to cyberattacks.11 According to a report from Check Point Research,
organisations in the country faced an average of 2,108 cyberattacks
weekly in the first quarter of 2023, marking a 15-percent increase from
the same period in previous years.12 Critical infrastructure has often been at the
receiving end of cyberattacks. Notable ones13 include the Cosmos bank fraud in
2018 where a malware attack authorised fraudulent transactions, causing the
bank to lose INR 94 crore;14 the D-Track malware attack in 2019 that breached
the Kudankulam reactor’s administrative network;15 and in 2022, the disruption
of the IT network of AIIMS, one of India’s leading government-run hospitals.16
India came close to a public attribution in 2018 when a report shared with the
National Security Council Secretariat by CERT-In claimed that 35 percent of
cyberattacks on official Indian websites originated from China, followed by 17
percent from the United States (US), 15 percent from Russia, 8 percent from
Pakistan, 7 percent from Canada, and 5 percent from Germany.18 However, the
full report, along with any accompanying evidence, is not in the public domain
and information can only be gleaned from media reports. It is therefore
unclear whether CERT-In has attributed specific attacks to specific perpetrators
or countries.
Indeed, politicians and authorities have made a conscious effort not to name
the perpetrator or state of origin when acknowledging and characterising
cyberattacks or attempts to conduct cyberattacks. For example, the government
explicitly denied a Chinese role in a cyberattack in 2020 that temporarily
brought down the Maharashtra electricity grid, despite findings by threat
intelligence company Recorded Future suggesting that it was the case.19
With the more recent AIIMS cyberattack, in a written reply to the Rajya
Sabha, Minister of State Rajeev Chandrashekhar forensically characterised
the “sophisticated ransomware” attack and claimed it was a “conspiracy and
planned by [significant] forces.”20 He also divulged vulnerabilities in network
segmentation that enabled the perpetrators to conduct the attack but stopped
short of attributing the attack to a non-state actor or a nation state.
5
Perspectives of States, Non-State Actors, and
Global Forums on Public Cyber Attribution
State Practice
While India has taken a clear stance to not publicly attribute, others have taken
a different route. A number of countries have expressed national positions
on attribution, either in statements on the applicability of international law to
cyberspace or in their national cybersecurity strategies.21 France,22 Germany,23
Finland,24 and Italy25 clearly state that the choice to publicly attribute or not
is a national sovereign prerogative and an independent decision to be made
by each nation-state. While all states refer to the applicability of the existing
international law on cyber attribution to cyberspace, some underscore the
relevance of the political aspects of cyber attribution. France and Finland
explicitly state that the decision to attribute a cyberattack originating in another
state is a national political decision that must take several circumstances and
evidence into account.
State-led public attributions for cyberattacks thus far have mostly been carried
out by the US, the EU, and their NATO partners.28 With notable exceptions such
as Brazil and Pakistan, these are the same states that have weighed in officially
on the applicability of existing international law standards to cyberspace.
Other states, such as China, are more circumspect about the public attribution
of cyberattacks by the US and its partners in the Five Eyes intelligence alliance
(Australia, Canada, New Zealand, and the UK).29 In Beijing’s view, public
attributions by the US are underscored by vague norms regarding the acceptable
limits of offensive cyber operations and act as both a legal weapon to legitimise
future indictments and sanctions against China and a political weapon to inflict
6
Perspectives of States, Non-State Actors, and
Global Forums on Public Cyber Attribution
reputational costs on the adversary.30 This position need not be taken at face
value, though. Beijing itself participates in offensive cyber activity, and the claim
of politicisation itself could be used to delegitimise US attribution and follow-up
action, even if they are in line with accepted standards of international law.
Global Forums
7
Perspectives of States, Non-State Actors, and
Global Forums on Public Cyber Attribution
The 2021 report also recommended cooperation between Computer
Emergency Response Teams that could improve state capacity in detecting and
investigating malicious attacks. Finally, it recommended that states proactively
use regional, bilateral, and multilateral forums to exchange best practices and
cast light on national approaches to attribution, with the overarching goal of
fostering common understandings and an exchange of best practices.
It is also worth noting that several public attributions have been conducted by
private sector actors. Cybersecurity firms Mandiant37 and Crowdstrike38 have
published detailed reports attributing high-profile cyber incidents to China
and Russia, respectively. Recorded Future, another US-based cybersecurity
firm, has attributed the continuous targeting of critical infrastructure in India,
including electricity grids, to Chinese state-sponsored groups.39 With the
ongoing armed conflict in Ukraine, US-based technology companies such as
Microsoft and Google have published detailed blog posts publicly attributing
aggressive, offensive cyber activity to Russian-backed cyber actors looking to
gain decisive war-time advantage. Non-government organisations such as
Citizen Lab,40 Electronic Frontier Foundation,41 and Amnesty International42
have also publicly attributed the deployment of offensive cyber capabilities,
largely in instances where these capabilities have been deployed against
journalists, politicians, or human rights defenders.
8
T
he decision-making framework for publicly attributing cyber
incidents should appreciate the multiple possible goals of cyber
attribution, utilise India’s institutional architecture effectively,
and have clear criteria in place at each step of the detection and
attribution process. Most significantly, decision-makers must
keep in mind that publicly attributing a cyberattack does not signal a cyber
defence failure to the Indian public or the wider world.45 Cyberattacks and
breaches are an accepted part of today’s geopolitical scenario. A well-articulated
cyber attribution could signal that the Indian institutional architecture and
forensic capability are resilient enough to deal with this new reality.
paragraphs:
9
Norm-building: ‘Naming and shaming’ action that violates norms agreed
upon at international forums strengthens the norm by “demarcating what is
appropriate behaviour” and publicly pushing countries to comply. Of course,
norm-building works best if norms of responsible state behaviour or prevailing
understandings of international law are explicitly referenced in the statement
attributing specific cyber incidents.
10
of confidence in the characterisation; the need to protect sensitive sources;
geopolitical considerations such as whether the attack originates from an
adversarial or friendly country; available response options that could be
undermined by a public attribution; the severity of the attack; and risks of
escalation.51
The first option is a criminal indictment that can be exercised if the law
enforcement authorities have sufficient evidence to prosecute under the Indian
Penal Code or Information Technology Act. As we are dealing with international
A Decision-Making
11
Before effectively attributing specific cyber incidents, India must issue a
statement clearly highlighting the Indian perspective on how international
law applies to cyber attribution and the necessary evidentiary standards.
Without such understanding, the legitimacy and credibility of each specific
cyber attribution may be questioned as being politically motivated and lacking
consistency.
The third option is a political attribution at the Ministerial level that need
not reference international law or meet evidentiary standards. Instead, the
goal is to win “the hearts and minds of audiences that open up with public
attribution.”54 Indeed, most public cyber attributions have not referenced
domestic or international law.55
A Decision-Making
To be sure, this option may have similar consequences as the decision to not
attribute in the first place. However, the trade-offs, outcomes, and decision-
making processes are entirely different. In a case where India decides to not
publicly attribute at all and there is no evidence from a third-party actor, India
12
has to live with the possibility that the attack may not get attributed at all.
Option D outlines the trade-offs involved in situations where a public attribution
has been conducted or is in the process of being conducted by a third-party
organisation, which means that the attack will be publicly attributed, just not by
the Indian government.
2. Evidence satisfies
National Cyber Security
International Law international law
Coordinator and Ministry
Attribution thresholds.
of External Affairs
3. Potentially useful if
public countermeasures
Framework
13
N
one of these available options, either individually or in concert,
will necessarily achieve the set-out goals given the variables
at play. However, bearing this framework in mind provides
decision-makers with more options. For example, a criminal
indictment underscored by a strong public statement by the
National Cyber Security Coordinator could demonstrate India’s capabilities
while undermining that of adversaries even if no one faces a single day in court.
Given its geopolitical position in cyberspace, India cannot afford to not use
the critical option of public attribution, when deemed effective, to navigate the
uncertainty of cyber unpeace and further its strategic interests. Cyber unpeace
is here to stay and cannot be wished away; the imperative is to use institutions,
norms, and capabilities to mitigate its impact.
The first version of this brief appeared in the ORF-GP volume, Future Warfare and
Critical Technologies: Evolving Tactics and Strategies, which can be accessed here:
https://www.orfonline.org/public/uploads/posts/pdf/20240212113627.pdf
14
1 Lucas Kello, The Virtual Weapon and International Order (New Haven, CT: Yale University
Press, 2017), 78.
2 Lucas Kello, “Cyber Legalism: Why it Fails and What to Do About it,” Journal of
Cybersecurity 7, 2021, https://academic.oup.com/cybersecurity/article/7/1/tyab014/6343244.
4 Thomas Rid and Ben Buchanan, “Attributing Cyber Attacks,” Journal of Strategic Studies 38
(2015).
8 Izumi Nakamitsu, “Remarks at the UN Securiry Council Open Debate on Cyber Security:
Maintaining International Peace and Security in Cyberspace” (speech, VTC, June 29,
2021), UNODA, https://un.mfa.ee/wp-content/uploads/sites/57/2021/06/Nakamitsu-29-
June.pdf.
9 Florian J. Egloff and Max Smeets, “Publicly Attributing Cyber Attacks,” Journal of
Strategic Studies 46, no. 3 (2023), https://www.tandfonline.com/doi/full/10.1080/014023
90.2021.1895117; Ariel (Eli) Levite and June Lee, “Attribution and Characterization of
Cyber Attacks,” in Managing U.S.-China Tensions Over Public Cyber Attribution, ed. Ariel
E. Levite et al. (Washington DC: Carnegie Endowment for International Peace, 2023),
https://carnegieendowment.org/2022/03/28/attribution-and-characterization-of-cyber-
attacks-pub-86698; Dennis Broeders, Els De Busser, and Patryk Pawlak, “Three Tales of
Endnotes
Attribution in Cyberspace: Criminal Law, International Law and Policy Debates,” The
Hague Program for Cyber Norms, 2020, https://www.universiteitleiden.nl/en/research/
research-output/governance-and-global-affairs/three-tales-of-attribution-in-cyberspace.-
criminal-law-international-law-and-policy-debates.
11 K. V. Kurmanath, “India Emerges as Top-3 Target for Nation-State Driven Cyber Attacks,”
Business Line, October 6, 2023, https://www.thehindubusinessline.com/info-tech/india-
emerges-as-top-3-target-for-nation-state-driven-cyber-attacks/article67387522.ece
12 Tech Desk, “Cyber Attacks Increased by 18 Per Cent This Year Alone in India,” Indian
Express, May 7, 2023, https://indianexpress.com/article/technology/tech-news-technology/
cyber-attacks-in-india-increased-by-18-per-cent-in-2023-check-point-8596348/.
15
13 See for a detailed coverage of notable cyber incidents, Sameer Patil, Securing India in the
Cyber Era (Oxon: Routledge,2022).
14 Express News Service, “Cosmos Bank Malware Attack: Pune Court Convicts 11 Accused,”
Indian Express, April 23, 2023, https://indianexpress.com/article/cities/pune/cosmos-bank-
malware-attack-pune-court-convicts-11-accused-8570830/.
15 Melissa Robbins, “Cyberattack Hits Indian Nuclear Plant,” Arms Control Today, December
2019, https://www.armscontrol.org/act/2019-12/news/cyberattack-hits-indian-nuclear-plant.
16 Ashish Aryan, “AIIMS Cyber Attack Took Place Due to Improper Networks
Segmentation,” Economic Times, February 10, 2023, https://economictimes.indiatimes.com/
tech/technology/aiims-cyber-attack-took-place-due-to-improper-network-segmentation-
govt-in-rs/articleshow/97805598.cms?from=mdr.
17 Soumik Ghosh, “Lack of Cyber Attribution a Major Challenge for India: Lt. Gen Pant,”
CSO, September 2, 2020, https://www.csoonline.com/article/569797/lack-of-cyber-
attribution-a-major-challenge-for-india-lt-gen-pant.html.
18 Mahender Singh Manral, “35 Percent of Cyber Attacks on Indian Sites from China:
Official Report,” Indian Express, August 23, 2018, https://indianexpress.com/article/
india/35-of-cyber-attacks-on-indian-sites-from-china-official-report/.
19 ANI, “‘Human Error, Not Chinese Cyber Attack,’ Says Union Power Minister on Mumbai
2020 Blackout,” Economic Times, May 3, 2021, https://energy.economictimes.indiatimes.
com/news/power/human-error-not-chinese-cyber-attack-says-union-power-minister-on-
mumbai-2020-blackout/81303209
20 Aryan, “AIIMS Cyber Attack Took Place Due to Improper Networks Segmentation”
Page.
24 Ministry of Foreign Affairs, “Finland Published its Positions on Public International Law in
Cyberspace,” Finnish Government, October 15, 2020, https://valtioneuvosto.fi/en/-/finland-
published-its-positions-on-public-international-law-in-cyberspace.
25 Italian Ministry for Foreign Affairs and International Cooperation, “Italian Position
Paper on International Law and Cyberspace,” 2021, https://www.esteri.it/mae/resource/
doc/2021/11/italian_position_paper_on_international_law_and_cyberspace.pdf.
16
26 Ministerie van Defensie, “Defensie Cyber Strategie 2018: Investeren in Digitale Slagkracht
Voor Nederland,” trans. Egloff and Smeets, 2018.
27 The Department of Defense, The Department of Defense Cyber Strategy (Washington DC:
Department of Defense), https://www.hsdl.org/c/view?docid=764848.
34 NATO CCDCOE, “National Position of the Netherlands (2019) in the NATO CCDCOE
Cyber Law Toolkit Database,” https://cyberlaw.ccdcoe.org/wiki/National_position_of_the_
Netherlands_(2019); NATO CCDCOE Cyber Law Toolkit, https://cyberlaw.ccdcoe.org/
wiki/Main_Page.
37 “APT1: Exposing One of China’s Espionage Units,” Mandiant, December 30, 2021, https://
www.mandiant.com/resources/reports/apt1-exposing-one-chinas-cyber-espionage-units.
38 Brian Ross et al., “‘Beyond a Reasonable Doubt’ Russians Hacked DNC, Analyst Says,”
abc News, July 26, 2016, https://abcnews.go.com/International/reasonable-doubt-russians-
hacked-dnc-analyst/story?id=40863292.
39 INSIKT Group, “Continued Targeting of Indian Power Grid Assets by Chinese State-
Sponsored Activity Groups,” Recorded Future, April 6, 2022, https://www.recordedfuture.
com/continued-targeting-of-indian-power-grid-assets.
17
41 Cooper Quintin and Eva Galperin, “Dark Caracal: You Missed a Spot,” Electronic Frontier
Foundation, December 10, 2020, https://www.eff.org/deeplinks/2020/12/dark-caracal-you-
missed-spot.
42 Amnesty International, “The Pegasus Project: How Amnesty Tech Uncovered the Spyware
Scandal-New Video,” Amnesty International, March 23, 2022, https://www.amnesty.org/
en/latest/news/2022/03/the-pegasus-project-how-amnesty-tech-uncovered-the-spyware-
scandal-new-video/https://www.amnesty.org/en/latest/news/2022/03/the-pegasus-project-
how-amnesty-tech-uncovered-the-spyware-scandal-new-video/.
44 Jamie Collier and Shanyn Ronis, “Navigating the Trade-Offs of Cyber Attribution,”
Mandiant, January 17, 2023, https://www.mandiant.com/resources/blog/trade-
offs-attribution#:~:text=Attribution%20percent20matters%20percent2C%20
percent20but%20percent20to%20percent20what,regularly%20percent20involves%20
percent20difficult%20percent20trade%20percent2Doffs.
47 Jack Goldsmith and Robert D. Williams, “The Failure of the United States’ Chinese-
Hacking Indictment Strategy,” Lawfare, December 28, 2018, https://www.lawfareblog.com/
failure-united-states-chinese-hacking-indictment-strategy.
48 Garrett Hinck and Tim Maurer, “Persistent Enforcement: Criminal Charges as a Response
to Nation-State Malicious Cyber Activity,” Journal of National Security Law and Policy 10
(2020): 528.
six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-
and.
50 For details on India’s cybersecurity architecture, see Arindrajit Basu, India’s International
Cyber Operations: Tracing National Doctrine and Capabilities, United Nations Institute for
Disarmament Research, Geneva, UNIDIR, 2022, https://www.unidir.org/cyberdoctrines/
India.
52 See Broeders, De Busser and Pawlak for a good overview of various options
18
55 Dan Efrony and Yuval Shany, “A Rule Book on the Shelf? Tallinn Manual 2.0 on
Cyberoperations and Subsequent State Practice,” American Journal of International Law 112,
no. 4 (2018), https://www.cambridge.org/core/journals/american-journal-of-international-
law/article/abs/rule-book-on-the-shelf-tallinn-manual-20-on-cyberoperations-and-
subsequent-state-practice/54FBA2B30081B53353B5D2F06F778C14.
19
Ideas . Forums . Leadership . Impact